Foreword |
|
xxiii | |
Preface |
|
xxv | |
Authors |
|
xxix | |
Section I Visual Cryptography |
|
|
Chapter 1 Visual Cryptography: Introduction |
|
|
3 | (24) |
|
|
4 | (1) |
|
|
5 | (2) |
|
1.3 Applications Of Visual Cryptography |
|
|
7 | (4) |
|
1.3.1 Trojan-Free Secure Transaction |
|
|
7 | (3) |
|
|
10 | (1) |
|
|
11 | (1) |
|
1.3.4 Transaction Tracking |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
11 | (2) |
|
1.5 Fundamental Principles Of Visual Secret Sharing |
|
|
13 | (3) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
1.5.4 Concept Of Black And White Pixels In Visual Cryptography |
|
|
16 | (1) |
|
1.6 Formation Of A Basis Matrix |
|
|
16 | (3) |
|
1.6.1 Observations Related To The Basis Matrix Creation Approach Of Naor And Shamir |
|
|
17 | (1) |
|
1.6.2 Essential Conditions For A Basis Matrix |
|
|
18 | (1) |
|
1.7 Different Evaluation Parameters |
|
|
19 | (8) |
|
1.7.1 Objective Evaluation Parameters |
|
|
19 | (4) |
|
1.7.2 Subjective Parameters |
|
|
23 | (4) |
|
Chapter 2 Various Dimensions Of Visual Cryptography |
|
|
27 | (38) |
|
2.1 Various Dimensions Of Visual Cryptography |
|
|
28 | (37) |
|
2.1.1 Traditional Visual Cryptography (TVC) |
|
|
29 | (3) |
|
2.1.1.1 Threshold Visual Cryptography |
|
|
30 | (2) |
|
2.1.2 Extended Visual Cryptography (EVC) |
|
|
32 | (15) |
|
2.1.2.1 Halftone Visual Cryptography (HVC) |
|
|
32 | (1) |
|
2.1.2.2 Significance Of A Halftone Image Over A Binary Image |
|
|
33 | (1) |
|
2.1.2.3 Halftone Image Creation Using Error Diffusion |
|
|
33 | (4) |
|
2.1.2.4 Tagged Visual Cryptography (TVC) |
|
|
37 | (2) |
|
2.1.2.5 Friendly Visual Cryptography (FVC) |
|
|
39 | (1) |
|
2.1.2.6 Size Invariant Visual Cryptography |
|
|
39 | (3) |
|
2.1.2.7 Progressive Visual Cryptography (PVC) |
|
|
42 | (1) |
|
2.1.2.8 Progressive Visual Cryptography With Meaningful Shares Without Pixel Expansion |
|
|
43 | (4) |
|
2.1.3 Dynamic Visual Cryptography (DVC) |
|
|
47 | (21) |
|
2.1.3.1 Multitone/Continuous Tone Visual Cryptography (MVC) |
|
|
47 | (2) |
|
2.1.3.2 MVC With Unexpanded Meaningful Shares |
|
|
49 | (1) |
|
2.1.3.3 Perfect Recovery Of The Secret Image In MVC |
|
|
50 | (1) |
|
2.1.3.4 Visual Cryptography With Multiple Secrets Or Multi Secret Sharing (MSS) |
|
|
51 | (1) |
|
2.1.3.5 Angle Restriction Problem In Mss |
|
|
51 | (3) |
|
2.1.3.6 Multi Secret Sharing With Unexpanded Meaningful Shares |
|
|
54 | (1) |
|
2.1.3.7 XOR-Based Visual Cryptography |
|
|
54 | (2) |
|
2.1.3.8 Hybrid Approach With XOR-Based VC, Multitone VC, FVC, Size Invariant VC And Multi Secret Sharing |
|
|
56 | (1) |
|
2.1.3.9 Verifiable Visual Cryptography (VVC) |
|
|
57 | (3) |
|
2.1.3.10 Hybrid Approach With VVC |
|
|
60 | (1) |
|
2.1.3.11 Random Grid-Based Visual Cryptography (RGVC) |
|
|
60 | (1) |
|
2.1.3.12 Hybrid Approaches Using RGVC |
|
|
61 | (4) |
|
Chapter 3 VC Approaches With Computationless Recovery Of Secrets |
|
|
65 | (42) |
|
3.1 Computation Less And Computation-Based Visual Cryptography Approaches |
|
|
66 | (2) |
|
3.2 Basics For The Development Of Computation- Less VC Approaches |
|
|
68 | (39) |
|
3.2.1 Development Of Threshold Visual Cryptography |
|
|
68 | (6) |
|
3.2.2 Development Of A Halftone Visual Cryptography (HVC) Scheme |
|
|
74 | (3) |
|
3.2.3 Development Of A Friendly Visual Cryptography (FVC) Scheme |
|
|
77 | (3) |
|
3.2.4 Development Of Size Invariant Visual Cryptography |
|
|
80 | (6) |
|
3.2.4.1 Preprocessing Of Secret Image For Size Invariant Visual Cryptography |
|
|
80 | (4) |
|
3.2.4.2 Size Invariant Share Generation With The Help Of The Preprocessed Secret |
|
|
84 | (2) |
|
3.2.5 Development Of A Hybrid Approach Using Friendly Visual Cryptography (FVC) And Size Invariant Visual Cryptography |
|
|
86 | (5) |
|
3.2.5.1 Steps For Making A Hybrid Approach |
|
|
86 | (5) |
|
3.2.6 Development Of Random Grid-Based Visual Cryptography |
|
|
91 | (4) |
|
3.2.6.1 Steps To Generate Shares Using A Random Grid |
|
|
93 | (2) |
|
3.2.7 Development Of Visual Cryptography With Multiple Secrets |
|
|
95 | (5) |
|
3.2.7.1 Steps To Generate Shares For Multiple Secrets |
|
|
95 | (5) |
|
3.2.8 Development Of Progressive Visual Cryptography (PVC) |
|
|
100 | (7) |
|
Chapter 4 VC Approaches With Computation-Based Recovery Of Secrets |
|
|
107 | (38) |
|
4.1 Computationless And Computation-Based Visual Cryptography Approaches |
|
|
109 | (2) |
|
4.1.1 Computation-Based VC vs. Share Alignment Problem |
|
|
109 | (2) |
|
4.2 Basics For The Development Of Computation- Based VC Approaches |
|
|
111 | (34) |
|
4.2.1 Development Of XOR-Based Visual Cryptography |
|
|
112 | (1) |
|
4.2.2 Basis Matrix Creation For The XOR-Based VC Approach |
|
|
112 | (4) |
|
4.2.3 XOR-Based VC With Unexpanded Meaningful Shares |
|
|
116 | (1) |
|
4.2.3.1 Steps To Develop XOR-Based VC With Unexpanded Meaningful Shares |
|
|
116 | (1) |
|
4.2.4 Development Of Multitone Visual Cryptography |
|
|
117 | (6) |
|
4.2.4.1 Steps To Develop Multitone Visual Cryptography With Random Shares |
|
|
119 | (3) |
|
4.2.4.2 Steps To Generate Meaningful Shares For A Multitone Secret |
|
|
122 | (1) |
|
4.2.5 Development Of XOR-Based Multi Secret Sharing Approach For Multitone Secrets |
|
|
123 | (6) |
|
4.2.5.1 Steps To Develop XOR-Based Multi Secret Sharing Approach For Multitone Secrets With Random Shares |
|
|
123 | (6) |
|
4.2.6 XOR-Based MSS With Unexpanded Meaningful Shares |
|
|
129 | (1) |
|
4.2.7 Development Of Verifiable Visual Cryptography |
|
|
129 | (18) |
|
4.2.7.1 Providing Verifiability Into The Shares Generated By Computationless VC Approaches |
|
|
130 | (1) |
|
4.2.7.2 Steps For Adding Verifiability Into The Shares Generated By Computationless VC Approaches |
|
|
130 | (4) |
|
4.2.7.3 Adding Verifiability Into The Shares Generated By Computation-Based VC Approaches |
|
|
134 | (2) |
|
4.2.7.4 Steps For Providing Verifiability In The Shares Generated By Computation-Based VC Approaches |
|
|
136 | (9) |
Section II Digital Image Watermarking |
|
|
Chapter 5 Digital Image Watermarking: Introduction |
|
|
145 | (32) |
|
|
147 | (3) |
|
5.1.1 Significance Of The Word "Watermark" |
|
|
149 | (1) |
|
5.1.2 Importance Of Watermarking |
|
|
149 | (1) |
|
5.2 Watermarking Applications |
|
|
150 | (5) |
|
|
150 | (1) |
|
5.2.2 Ownership Identification |
|
|
150 | (1) |
|
5.2.3 Broadcast Monitoring |
|
|
150 | (1) |
|
5.2.4 Content Authentication |
|
|
151 | (1) |
|
|
152 | (1) |
|
5.2.6 Transaction Tracking |
|
|
152 | (3) |
|
|
155 | (1) |
|
|
155 | (1) |
|
5.3 Classification Of Watermarking Techniques |
|
|
155 | (6) |
|
5.3.1 Based On Visibility |
|
|
156 | (1) |
|
5.3.1.1 Visible Watermarking |
|
|
156 | (1) |
|
5.3.1.2 Invisible/Hidden Watermarking |
|
|
157 | (1) |
|
5.3.2 Based On Degree Of Resistance To Attacks |
|
|
157 | (2) |
|
|
157 | (1) |
|
5.3.2.2 Fragile Watermark |
|
|
158 | (1) |
|
5.3.2.3 Semi-Fragile Watermark |
|
|
158 | (1) |
|
5.3.2.4 Dual Watermarking |
|
|
159 | (1) |
|
5.3.3 Based On Watermark Embedding |
|
|
159 | (1) |
|
5.3.3.1 Block-Based Watermarking |
|
|
159 | (1) |
|
5.3.3.2 Pixel-Based Watermarking |
|
|
160 | (1) |
|
5.3.4 Based On Watermark Detection/Extraction |
|
|
160 | (1) |
|
5.3.4.1 Non-Blind/Non-Oblivious Watermarking |
|
|
160 | (1) |
|
5.3.4.2 Semi-Blind Watermarking |
|
|
161 | (1) |
|
5.3.4.3 Blind/Oblivious Watermarking |
|
|
161 | (1) |
|
5.4 Properties Of Watermarks |
|
|
161 | (3) |
|
|
161 | (2) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
|
164 | (1) |
|
|
164 | (3) |
|
|
164 | (2) |
|
5.5.1.1 Intentional Attack |
|
|
164 | (1) |
|
5.5.1.2 Unintentional Attack |
|
|
165 | (1) |
|
5.5.2 Example Of Attacks In The Watermarking System |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
5.5.2.3 Cryptographic Attacks |
|
|
166 | (1) |
|
5.5.2.4 Copy Paste Attack |
|
|
166 | (1) |
|
5.5.2.5 Print Scan Attack |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
|
168 | (1) |
|
5.7 Measures Of Evaluation |
|
|
168 | (5) |
|
5.7.1 Subjective Measures |
|
|
169 | (1) |
|
|
170 | (3) |
|
5.7.3 Other Evaluation Parameters |
|
|
173 | (1) |
|
5.7.3.1 False Acceptance Rate (FAR) |
|
|
173 | (1) |
|
5.7.3.2 False Rejection Rate (FRR) |
|
|
173 | (1) |
|
5.8 Watermarking Scheme With Recovery Capabilities |
|
|
173 | (4) |
|
5.8.1 Recovery Using Spatial Domain |
|
|
173 | (1) |
|
5.8.2 Recovery Using Frequency Domain |
|
|
174 | (3) |
|
Chapter 6 Fragile Watermarking |
|
|
177 | (42) |
|
|
179 | (4) |
|
6.1.1 Fragile Watermark As A Hash Function For Images |
|
|
179 | (1) |
|
6.1.2 Fragility Of A Fragile Watermark |
|
|
179 | (1) |
|
6.1.3 Types Of Fragile Watermark |
|
|
180 | (3) |
|
6.1.3.1 On The Basis Of The Embedding Mechanism |
|
|
181 | (1) |
|
6.1.3.2 On The Basis Of The Extraction Mechanism |
|
|
182 | (1) |
|
6.2 Generation Of A Fragile Watermark |
|
|
183 | (13) |
|
6.2.1 Image-Based Fragile Watermark |
|
|
183 | (4) |
|
6.2.1.1 Relation Between Cover Image And Image-Based Watermark |
|
|
184 | (3) |
|
6.2.2 Self-Embedding Techniques |
|
|
187 | (2) |
|
6.2.2.1 Relation Between Cover Image And Self-Embedding Watermark |
|
|
188 | (1) |
|
6.2.3 Example Of Self-Embedding Techniques |
|
|
189 | (4) |
|
6.2.4 Significance Of The XOR Operation In Self-Embedding |
|
|
193 | (1) |
|
6.2.5 Fragile Watermark With Symmetric Key |
|
|
194 | (1) |
|
6.2.6 Watermark Generation For Color Images |
|
|
195 | (1) |
|
6.3 Embedding Of A Fragile Watermark |
|
|
196 | (13) |
|
|
196 | (1) |
|
|
196 | (1) |
|
|
197 | (1) |
|
6.3.1.3 Which Domain Is Suitable For A Fragile Watermark? |
|
|
197 | (1) |
|
|
197 | (7) |
|
6.3.2.1 Which Bit Should Be Chosen For Embedding? |
|
|
200 | (1) |
|
6.3.2.2 How Many Bits Should Be Chosen For Embedding? |
|
|
201 | (3) |
|
6.3.3 Imperceptibility vs. Tamper Detection |
|
|
204 | (5) |
|
6.3.3.1 Block-Based Embedding |
|
|
204 | (1) |
|
6.3.3.2 Pixel-Based Embedding |
|
|
205 | (2) |
|
6.3.3.3 Region-Of-Interest (ROI)-Based Embedding |
|
|
207 | (2) |
|
6.4 Extraction Of A Fragile Watermark |
|
|
209 | (10) |
|
6.4.1 Unintentional Tampering |
|
|
209 | (1) |
|
6.4.2 Intentional Tampering |
|
|
210 | (1) |
|
6.4.3 Semi-Fragile Watermarks |
|
|
211 | (1) |
|
6.4.4 Tamper Localization |
|
|
212 | (2) |
|
6.4.4.1 Tamper Localization For Non-Blind Fragile Watermark |
|
|
213 | (1) |
|
6.4.4.2 Tamper Localization For Semi-Blind Fragile Watermark |
|
|
213 | (1) |
|
6.4.4.3 Tamper Localization For Blind Fragile Watermark |
|
|
213 | (1) |
|
6.4.4.4 Pixel Wise Tamper Detection |
|
|
213 | (1) |
|
6.4.4.5 Block Wise Tamper Detection |
|
|
214 | (1) |
|
6.4.5 Tamper Detection Parameters |
|
|
214 | (5) |
|
Chapter 7 Fragile Watermark With Recovery Capabilities In Spatial Domain |
|
|
219 | (30) |
|
|
221 | (7) |
|
7.1.1 Fragile Watermark With Recovery Capabilities |
|
|
221 | (1) |
|
7.1.2 Summary Bit Stream: Recovery Information |
|
|
221 | (1) |
|
7.1.3 Summary And Authentication Bit Streams |
|
|
222 | (1) |
|
7.1.4 Fragility Of Fragile Watermark |
|
|
222 | (1) |
|
7.1.5 Types Of Fragile Watermark With Recovery Capabilities |
|
|
223 | (4) |
|
7.1.5.1 On The Basis Of The Embedding Mechanism |
|
|
223 | (3) |
|
7.1.5.2 On The Basis Of The Extraction Mechanism |
|
|
226 | (1) |
|
7.1.6 Ideal Category For Fragile Watermark With Recovery Capabilities |
|
|
227 | (1) |
|
7.2 Generation Of A Fragile Watermark |
|
|
228 | (9) |
|
7.2.1 Self-Embedding Techniques |
|
|
228 | (9) |
|
7.2.1.1 Self-Embedding With Block-Based Authentication And Block-Based Recovery |
|
|
229 | (5) |
|
7.2.1.2 Self-Embedding With Pixel-Based Authentication And Block-Based Recovery |
|
|
234 | (1) |
|
7.2.1.3 Self-Embedding With Pixel-Based Authentication And Pixel-Based Recovery |
|
|
234 | (3) |
|
7.3 Embedding Of Fragile Watermark |
|
|
237 | (3) |
|
7.3.1 Embedding And Originating Blocks Are Same: |
|
|
237 | (1) |
|
7.3.2 Originating Blocks Are Embedded Into Sequentially Mapped Embedding Blocks |
|
|
237 | (2) |
|
7.3.3 Originating Blocks Are Embedded Into Randomly Mapped Embedding Blocks |
|
|
239 | (1) |
|
7.4 Extraction Of A Fragile Watermark |
|
|
240 | (9) |
|
7.4.1 Tamper Localization And Recovery |
|
|
241 | (6) |
|
7.4.1.1 Non-Blind Authentication And Non-Blind Recovery |
|
|
241 | (1) |
|
7.4.1.2 Semi-Blind Authentication And Semi-Blind Recovery |
|
|
241 | (1) |
|
7.4.1.3 Blind Authentication And Semi-Blind Recovery |
|
|
241 | (1) |
|
7.4.1.4 Blind Authentication And Blind Recovery |
|
|
242 | (1) |
|
7.4.1.5 Block-Based Tamper Detection And Recovery |
|
|
242 | (1) |
|
7.4.1.6 Pixel-Based Tamper Detection And Block-Based Recovery |
|
|
242 | (2) |
|
7.4.1.7 Pixel-Based Tamper Detection And Pixel-Based Recovery |
|
|
244 | (3) |
|
7.4.2 Non-Zero Far Due To Improper Mapping |
|
|
247 | (2) |
|
Chapter 8 Fragile Watermark With Recovery Capabilities In Frequency Domain |
|
|
249 | (20) |
|
|
250 | (3) |
|
8.1.1 Summary Bit Stream: Recovery Information Through Frequency Coefficient |
|
|
251 | (1) |
|
8.1.2 Types Of Fragile Watermark With Recovery Capabilities In Frequency Domain |
|
|
251 | (2) |
|
8.1.2.1 On The Basis Of The Embedding Mechanism |
|
|
252 | (1) |
|
8.1.2.2 On The Basis Of The Extraction Mechanism |
|
|
253 | (1) |
|
8.2 Generation Of A Fragile Watermark |
|
|
253 | (10) |
|
8.2.1 Self-Embedding Techniques |
|
|
254 | (9) |
|
8.2.1.1 Block-Based Self-Embedding Approach |
|
|
254 | (2) |
|
8.2.1.2 Example Of Block-Based Summary Bit Generation |
|
|
256 | (4) |
|
8.2.1.3 Non-Block-Based Self-Embedding Approach |
|
|
260 | (1) |
|
8.2.1.4 Example Of Summary Bit Generation For Non-Block-Based Recovery |
|
|
260 | (3) |
|
8.3 Embedding Of A Fragile Watermark |
|
|
263 | (2) |
|
8.3.1 Embedding Of Summary Bits In Spatial Domain |
|
|
263 | (1) |
|
8.3.2 Embedding Of Summary Bits In Frequency Domain |
|
|
264 | (1) |
|
8.4 Extraction Of A Fragile Watermark |
|
|
265 | (4) |
|
8.4.1 Tamper Localization And Recovery |
|
|
266 | (3) |
|
Chapter 9 Robust Watermarking |
|
|
269 | (24) |
|
|
271 | (6) |
|
9.1.1 Robust Watermark For Ownership Assertion |
|
|
271 | (1) |
|
9.1.2 Robustness Of Robust Watermark |
|
|
272 | (1) |
|
|
272 | (1) |
|
9.1.4 Relationship Between The Dimensions Of Cover And Watermarked Images |
|
|
273 | (1) |
|
9.1.5 Image Types For Watermark |
|
|
274 | (1) |
|
9.1.6 Single vs. Multiple Robust Watermarks |
|
|
274 | (1) |
|
9.1.7 Encrypted Robust Watermark |
|
|
275 | (1) |
|
9.1.8 Types Of Robust Watermark On The Basis Of Extraction Mechanism |
|
|
275 | (2) |
|
9.1.8.1 Non-Blind Robust Watermark |
|
|
275 | (1) |
|
9.1.8.2 Semi-Blind Robust Watermark |
|
|
276 | (1) |
|
9.1.8.3 Blind Robust Watermark |
|
|
276 | (1) |
|
9.2 Generation Of Robust Watermark |
|
|
277 | (1) |
|
9.2.1 Binary Vector Generation For Binary Images |
|
|
277 | (1) |
|
9.2.2 Binary Vector Generation For Gray/Color Images |
|
|
278 | (1) |
|
9.2.3 Encryption Of The Binary Vector Of Watermark |
|
|
278 | (1) |
|
9.3 Embedding Of Robust Watermarks |
|
|
278 | (5) |
|
9.3.1 Domain Selection For Embedding |
|
|
278 | (1) |
|
9.3.2 Embedding Of Robust Watermark In Frequency Domain |
|
|
279 | (4) |
|
9.3.2.1 DCT-Based Embedding For Robust Watermarks |
|
|
280 | (3) |
|
9.4 Extraction Of Robust Watermarks |
|
|
283 | (10) |
|
9.4.1 Effect Of Unintentional Tampering On A Watermark |
|
|
285 | (1) |
|
9.4.2 Effect Of Intentional Tampering On A Watermark |
|
|
285 | (1) |
|
9.4.3 Extraction Of Multiple Watermarks |
|
|
285 | (3) |
|
9.4.4 Extraction-Based Categorization Of Robust Watermarking |
|
|
288 | (2) |
|
9.4.4.1 Ownership Assertion For Non-Blind Robust Watermarks |
|
|
288 | (1) |
|
9.4.4.2 Ownership Assertion For Semi-Blind Robust Watermark |
|
|
288 | (2) |
|
9.4.4.3 Ownership Assertion For Blind Robust Watermark |
|
|
290 | (1) |
|
9.4.5 Decryption Of The Encrypted Watermark Bit Vector |
|
|
290 | (1) |
|
9.4.6 Watermark Comparison Parameters |
|
|
290 | (4) |
|
9.4.6.1 Objective Evaluation Parameters |
|
|
290 | (1) |
|
9.4.6.2 Subjective Evaluation Parameters |
|
|
291 | (2) |
|
Chapter 10 Dual Watermarking |
|
|
293 | (30) |
|
|
294 | (8) |
|
10.1.1 Need For Dual Watermark |
|
|
295 | (1) |
|
10.1.2 Managing Robustness And Fragility At The Same Time |
|
|
295 | (1) |
|
10.1.3 Image For Robust Watermark And Self-Embedding For Fragile Watermark |
|
|
296 | (1) |
|
10.1.4 Achievable Security Requirements Through Dual Watermarking |
|
|
297 | (1) |
|
10.1.5 Semi-Fragile Watermarks vs. Dual Watermarks |
|
|
297 | (1) |
|
10.1.6 Types Of Dual Watermarks |
|
|
298 | (4) |
|
10.1.6.1 On The Basis Of The Embedding Mechanism |
|
|
298 | (3) |
|
10.1.6.2 On The Basis Of The Extraction Mechanism |
|
|
301 | (1) |
|
10.2 Generation And Embedding Of Dual Watermarks |
|
|
302 | (8) |
|
10.2.1 Hierarchical Approach For Watermark Generation And Embedding |
|
|
302 | (5) |
|
10.2.1.1 Embedding Of The Watermark (Selected As Copyright) In The Frequency Domain |
|
|
303 | (1) |
|
10.2.1.2 Fragile Watermark Generation Using A Self-Embedding Approach From The Copy-Right Embedded Image |
|
|
304 | (2) |
|
10.2.1.3 Fragile Watermark Vector Fb Embedding In The Spatial Domain Of The Copyright Embedded Image IRW |
|
|
306 | (1) |
|
10.2.2 Validity Of The Proposed Dual Watermark Embedding Sequence |
|
|
307 | (3) |
|
10.3 Extraction Of Dual Watermarks |
|
|
310 | (13) |
|
10.3.0.1 Authentication And Authorization For Non-Blind Dual Watermark |
|
|
314 | (1) |
|
10.3.0.2 Authentication And Authorization For Semi-Blind Dual Watermarks |
|
|
314 | (1) |
|
10.3.0.3 Authentication And Authorization For Blind Dual Watermark |
|
|
315 | (1) |
|
10.3.0.4 Block Wise Tamper Detection |
|
|
315 | (1) |
|
10.3.0.5 Pixel Wise Tamper Detection |
|
|
315 | (1) |
|
10.3.1 Tamper Recovery In Dual Watermarking |
|
|
315 | (4) |
|
10.3.2 Tamper Detection And Watermark Comparison Parameters |
|
|
319 | (4) |
Section III Steganography |
|
|
|
323 | (16) |
|
|
324 | (3) |
|
11.1.1 Watermarking vs. Steganography |
|
|
325 | (1) |
|
11.1.2 Need For Steganography |
|
|
326 | (1) |
|
11.2 Applications Of Steganography |
|
|
327 | (1) |
|
11.2.1 Positive Applications |
|
|
327 | (1) |
|
11.2.2 Negative Applications |
|
|
328 | (1) |
|
11.3 Properties Of Steganography |
|
|
328 | (3) |
|
|
328 | (1) |
|
11.3.2 Embedding Capacity |
|
|
328 | (2) |
|
11.3.3 Embedding Effectiveness |
|
|
330 | (1) |
|
|
330 | (1) |
|
11.3.5 Statistical Undetectability |
|
|
330 | (1) |
|
|
330 | (1) |
|
|
331 | (1) |
|
|
331 | (1) |
|
11.4 Performance Measures For Steganography Approaches |
|
|
331 | (2) |
|
11.4.1 Embedding Capacity |
|
|
332 | (1) |
|
|
333 | (1) |
|
11.4.3 False Positive And False Negative |
|
|
333 | (1) |
|
|
333 | (1) |
|
11.5 Mathematical Notation And Terminology |
|
|
333 | (1) |
|
|
334 | (2) |
|
11.6.1 Passive Steganalysis |
|
|
334 | (1) |
|
11.6.2 Active Steganalysis |
|
|
334 | (1) |
|
11.6.3 Malicious Steganalysis |
|
|
335 | (1) |
|
|
336 | (3) |
|
11.7.1 Blind Steganalysis |
|
|
336 | (1) |
|
11.7.2 Targeted Steganalysis |
|
|
336 | (3) |
|
Chapter 12 Development Of Steganography And Steganalysis |
|
|
339 | (24) |
|
12.1 Practical Approach Towards Steganography |
|
|
340 | (1) |
|
12.2 Embedding Of A Secret Message |
|
|
341 | (12) |
|
12.2.1 Preprocessing A Secret Message |
|
|
341 | (7) |
|
12.2.1.1 Lossless Compression Of Secret Message |
|
|
342 | (5) |
|
12.2.1.2 Text To ASCII Code Generation |
|
|
347 | (1) |
|
12.2.1.3 ASCII Code To Binary Bit Conversion |
|
|
347 | (1) |
|
|
348 | (1) |
|
|
348 | (1) |
|
12.2.2.2 Frequency Domain |
|
|
348 | (1) |
|
12.2.3 Secret Bits Embedding |
|
|
349 | (4) |
|
12.2.3.1 Embedding In The Spatial Domain |
|
|
349 | (3) |
|
12.2.3.2 Embedding In The Frequency Domain |
|
|
352 | (1) |
|
12.3 Extraction Of Secret Messages |
|
|
353 | (3) |
|
12.3.1 Secret Bits Extraction |
|
|
353 | (2) |
|
12.3.2 Postprocessing Of Secret Bits |
|
|
355 | (1) |
|
12.3.3 Conversion From Bits To Readable Format |
|
|
356 | (1) |
|
12.4 Practical Approach Towards Steganalysis |
|
|
356 | (7) |
|
12.4.1 Cachin's Definition Of Steganography |
|
|
356 | (1) |
|
12.4.2 LSB-Based Steganalysis |
|
|
357 | (6) |
Section IV Hybrid Approaches And Advanced Research Topics |
|
|
Chapter 13 Image-Based Security Using VC, Watermarking & Steganography |
|
|
363 | (24) |
|
|
364 | (2) |
|
13.2 Hybrid Approach Using Steganography And Watermarking |
|
|
366 | (8) |
|
13.2.1 Combination Of Robust Watermarking And Steganography Approach |
|
|
366 | (4) |
|
13.2.1.1 Steps To Make A Hybrid Approach Using Robust Watermarking And A Steganography Approach |
|
|
369 | (1) |
|
13.2.1.2 Effect Of Steganography On The Water-Marked Image |
|
|
370 | (1) |
|
13.2.2 Combination Of A Fragile Watermarking And Steganography Approach |
|
|
370 | (3) |
|
13.2.2.1 Steps To Make A Hybrid Approach Using Fragile Watermarking And A Steganography Approach |
|
|
372 | (1) |
|
13.2.3 Valid Sequence For Steganography And Watermarking |
|
|
373 | (1) |
|
13.3 Hybrid Approach Using Visual Cryptography And Watermarking |
|
|
374 | (7) |
|
13.3.1 Combination Of VC With Halftone Shares And A Watermarking Approach |
|
|
374 | (2) |
|
13.3.1.1 Protection Of Halftone Shares Using Fragile Watermarks |
|
|
375 | (1) |
|
13.3.1.2 Effect Of A Fragile Watermark On Shares |
|
|
375 | (1) |
|
13.3.2 Combination Of VC With Multitone Shares And Watermarking Approach |
|
|
376 | (6) |
|
13.3.2.1 Protection Of A Multitone Shares With A Robust Watermarking Approach |
|
|
376 | (2) |
|
13.3.2.2 Protection Of Multitone Shares With A Fragile Watermarking Approach |
|
|
378 | (3) |
|
13.4 Hybrid Approach Using Visual Cryptography And Steganography |
|
|
381 | (1) |
|
13.5 Hybrid Approach Using Visual Cryptography, Watermarking And Steganography |
|
|
382 | (5) |
|
13.5.1 Combination Of Halftone VC With Fragile Watermarks And Steganography |
|
|
382 | (2) |
|
13.5.1.1 Steps To Embed A Fragile Watermark And Steganography Into The Halftone Share |
|
|
382 | (2) |
|
13.5.2 Combination Of Multitone VC With Fragile Watermarks, Robust Watermarks And Steganography |
|
|
384 | (3) |
|
Chapter 14 Protection Of Multimedia Objects Using Image-Based Security Methods |
|
|
387 | (20) |
|
|
388 | (2) |
|
14.2 Audio/Speech Watermarking And Steganography |
|
|
390 | (6) |
|
14.2.1 Selection Of The Watermark Format |
|
|
390 | (1) |
|
14.2.2 Audio Robust Watermarking |
|
|
390 | (4) |
|
14.2.2.1 Steps To Embed Robust Audio Water-Marks Or Steganographic Messages |
|
|
393 | (1) |
|
14.2.3 Audio Fragile Watermarking |
|
|
394 | (2) |
|
14.2.3.1 Steps For Embedding A Fragile Water-Marks Or Steganography Messages |
|
|
394 | (2) |
|
14.3 Audio/Speech Secret Sharing |
|
|
396 | (1) |
|
14.3.1 Steps To Create Shares Of The Speech Signal |
|
|
396 | (1) |
|
14.4 Video Watermarking, Steganography And Secret Sharing |
|
|
397 | (4) |
|
14.4.1 Basic Terminology For Video |
|
|
397 | (2) |
|
14.4.2 Process For Video Steganography/Watermarking |
|
|
399 | (1) |
|
14.4.3 Enhancing The Security Of Video Watermarking/Steganography |
|
|
399 | (2) |
|
|
401 | (2) |
|
|
401 | (2) |
|
14.5.2 Embedding Domain In 3D Models |
|
|
403 | (1) |
|
14.5.2.1 Geometric Features |
|
|
403 | (1) |
|
14.5.2.2 Topological Features |
|
|
403 | (1) |
|
14.6 3D Steganography And Secret Sharing |
|
|
403 | (1) |
|
14.7 Biometrics And Telemedicine |
|
|
404 | (3) |
Index |
|
407 | |